Tuesday, January 12, 2016

2016 Ultimate Buyer’s Guide for Business Security Camera Systems- Presented by Dennis Mancino HD view 360


When it comes to security for your business, don’t settle for less than the best. We cover questions that business owners ask us daily.
Maintaining your business takes all your time. Keeping it safe from would-be criminals is just as big of a challenge. We specialize in providing businesses with the best surveillance solutions in the industry. You can focus on running your business.

HD View 360 has been in business for more than 3 years. Over 5,000 HD View 360 security systems have been installed across the world. Many of these to businesses big and small.

We are obsessed with making great security systems. We are NOT a big box retailer putting out cheap products just to offer the lowest price. We are here to help you find the security system that's right for you. We only sell high quality products. We won't push you on features you don't need. Most of all, we won't disappear if problems arise. When you buy from us you get free lifetime technical support! Our customer service reps are always there, ready to help.


Before looking down long lists of product specs, ask yourself a few questions:
  • Do you want to be able to properly identify a person even in low light or dark conditions?
    • Be sure to look for for night vision security cameras with built-in infrared LED’s.
  • Do you want cameras that are wireless / wi-fi compatible?
    • Be sure to look for wireless IP cameras. In traditional security installations you run coaxial cable from the camera to the DVR. Running the wire isn't too difficult if you install the cameras within 500 feet of the DVR. If the camera is more than 750 feet away from the DVR the video quality begins to degrade. The video will lose clarity and definition. Cable runs this long are common in warehouses or parking areas. IP Cameras resolve this issue by processing the images on the camera. They send a wireless digital signal instead of analog. The cameras can then be connected to a local hardwire switch using Ethernet cable. You can also connect them to a wireless router.
    • Transmitting over wi-fi or Ethernet achieves higher quality digital video. It allows shorter cable runs. It is also easier to install. For wireless IP Cameras, just plug in the wall transformer. You can assign an IP address during the camera setup. The camera can then be wall mounted or placed on a desktop. They can also be moved as your security needs change.
  • Where will you be mounting the cameras?
    • Know that if you're going with indoor cameras, range often won't be much of an issue. For warehouses or large storage facilities you need to know the exact range. If you need clear footage from more than 100 feet away we recommend long range cameras.
  • How far / wide can the security cameras see?
    • The answer to this question depends on your lens size and width. The larger your lens size, the farther you’ll generally be able to see. Our camera has a 2.8-12mm varifocial lens that allows it to see up to 100 feet. Our powerful other cameras come with a 3.4-122.4mm zoom lens that lets you see up to 300 feet.
    • How wide of a viewing angle you have is dependent on the image sensor. Common sizes are 1/4” and 1/3”. Larger image sensors allow more light into the picture and give you a wider angle of view. For example, a 3.6mm lens will see almost 80 degrees wide. If you put it in the corner of a room you’ll see pretty much the entire room. A 50mm lens,will only give you a viewing angle of roughly 5 degrees wide. It’s like a camcorder, if you zoom in you can see farther away but your scene gets narrower.
  • What recording resolution do I need?
    • This is a common question when it comes to surveillance systems. Our systems range from 420 lines of resolution up to full HD 1080p resolution. 420-550 lines is enough for indoor systems monitoring a single area within 50 feet. If you are watching longer distances we recommend stepping up to 700+ resolution. 700+ provides a noticeable bump in image quality.
    • If you want the best system available on the market get an HD-SDI Complete System.
    • These systems provide recorded footage equal to your HDTV in full 1080p resolution. That is a 400%+ bump in resolution compared to standard 400-500 line cameras. The image below is a cropped version of two screenshots found here on our site. They illustrate the raw power that HD cameras have over standard definition cameras. The difference is image quality and pixels captured.

    • 420p versus 1080p. The difference between high definition and standard definition security cameras.
  • Do I need weatherproof cameras?
    • If you need cameras to record outdoors it's wise to go with weatherproof cameras. It is worth the extra peace of mind to know your cameras are not affected by extreme rain or wind. You can also place them under an awning or area that is covered and dry 100% of the time. We offer a wide range of outdoor security cameras that are weatherproof. Even in the toughest conditions.
  • Do I need varifocal or fixed lens cameras?
    • For cameras with a fixed length lens, measuring for field of view must be precise. Once the camera in place, what you see is what you get. A camera with an adjustable lens will give you greater flexibility during installation.
    • Not all lenses are made alike. There are three main categories of lenses: fixed focal length with a manual iris, vari-focal length with a manual iris, and vari-focal length with an automatic iris. The iris determines how much light the lens allows in the camera. Manual means the iris setting is constant until you adjust it. Automatic means the camera adjusts itself to lighting conditions.
    • Manual Iris works best inside office buildings where lighting is constant. You only need to adjust the manual iris during installation. If light in the environment changes over the course of the day get an automatic iris.
    • To illustrate the difference, imagine going to the optometrist for an eye exam. When the optometrist dilates your pupils it like seeing with a manual iris. Your pupil, like the iris of a camera lens, forces your eye to allow in as much light as possible. In a dim room, you see clearly.When you walk outside your eyes flood with light. This makes your vision out of focus and creates blind spots within your field of view.
    • Fixed length or vari-focal length: the ability to adjust the camera’s field of view. Vari-focal lenses come in a 3 configurations: 2.8mm-12mm, 4mm-9mm, or 5mm-50mm. These are adjustable.
    • Fixed focal lenses are available in in various sizes. These lenses have a set scope (fixed) to the noted lens size. The smaller the lens size, the wider the field of view. Camera lenses with the same focal length can produce different fields of view. Before you make a camera selection, know how you want the camera to perform.
  • How easily can I set up Remote Viewing on my security cameras?
    • This process will be different for every security system out there. We recommended consulting your instruction manual for details.
    • All HD View 360 DVRs are remote viewing capable out of the box. Our software lets you use remote viewing with almost any security camera. You can watch live events and recorded video from any computer. You can also use our apps for tablets and smartphones. This includes iPhones, iPads, Android Phones, and more!
    • All you need is a high-speed Internet connection to your DVR.

  • How much storage space do I need?
    • Our handy DVR storage calculator should help you with this step. It will give you a rough idea how much hard drive space you will need to hold your footage. Next you should decide what framerate you want your cameras to record. 7.5 frames per second per camera is the minimum. This will look like a group of photos linked together. But, it will allow weeks of footage on most hard drives. 15 frames per second will be much smoother but still a bit choppy. 30 FPS will look just as good as the footage you watch on television in most cases.
It is important to consider the company you are purchasing a security system from. Do they meets these requirements:
  • Do they deal solely in security products or is it just another line in their business?
    • Big name retailers sell millions of CCTV security systems every year. Then the return period expires. You are stuck with overseas technical support when something goes wrong. Don't settle for that. Buy from a USA-based retailer who sells just security camera systems. This provides the best value for your dollar in the long run.
  • How long have they been in the business?
    • Companies in business more than 10 years are more likely to still be there years from now. You'll be glad if you have problems with your system.
  • What is the knowledge level of the sales person?
    • Do they know just enough about the product specs to try and sell you a pre-packaged system? Do they have a salesperson who listens to your input? Who makes recommendations based on your needs and wants? All EZWatch employees have years of experience in the video security industry. They will help you design the proper system that meets your expectations.
  • Is technical support in house or a foreign call center?
    • We've been over this one already, but don't settle for outsourced call centers. Make sure the system you buy has technical support based here in the USA. A company who offers lifetime technical support such as EZWatch.

Why do I need a security system?

Remote Viewing Your Security Cameras There are many reasons to have a Video Security System. We believe the single most important reason is peace of mind. Knowing you can always look in on your cameras with remote viewing. Pulling up footage afterwards in the event of a break-in. This gives you peace of mind that you can't put a dollar value on.
Ensure that you will never walk into a dangerous situation. View your live or recorded video from any browser or smart phone before you go. It is easy to view your business or home before you arrive.
For Small Businesses: In a business setting, a CCTV security system serves several purposes.
  1. First, it helps keep all employees and customers honest. When people know they're being watched with security cameras thefts are far less likely. Criminals want to pick the easiest target possible.
  2. A video security system lets you view the shopping patterns of your customers. This can help you understand where to place merchandise for best results.
  3. Having security cameras at your registers can help solve any disputes. No more fights about the bill denomination used to pay or the change returned. If you have ever worked in retail before, you know how much of a headache these customers can be.
  4. See if any employee is entering incorrect amounts into the register. Prevent employee thefts.
For Factories/Warehouses: In a factory or warehouse setting, a video security system also serves multiple purposes.
  1. You have 24-hour video footage of the warehouse or any storage area. This might pay big dividends if you have ever experienced inventory shrinkage.
  2. In the event of a break-in you can provide the authorities with a recorded video of the event. This will improve their chances of solving the crime. This makes it easier to report to insurance too.
  3. A full security system for your business provides recorded video of any on-site accidents. Footage of the accident can help determine if the accident was legitimate. Prevent intentional "accidents" attempting to get a cash settlement for injuries.

How do I know I have the right equipment for my application?

Installing your own security camera system Do you have experience designing video security systems? If not, picking a complete system can be a daunting task. Designing the right system for your application is hard.
You can definitely DIY it. But, your best result will come from working with security experts. Those who have decades of experience in designing the right system for any application. Either way, you should answer the questions below before shopping for system components:
  • Will the cameras be indoors or outdoors?
  • Are the cameras I'm getting outdoor capable? Weatherproof?
  • Do you want to be able to view good quality video in low light or dark conditions?
  • Are the cameras I'm getting night vision/low light capable?
  • What are the lowest and highest temperatures expected where you will mount the cameras?
  • Is the system to be used for a home or business? 
    • If for a home, 400 or 550 lines of resolution will suffice for most installations. 
    • If for a business, our professional grade 700TVL cameras are recommended. You will have high quality video to help identify criminals. 
  • Do you want your DVR to record 24/7 or only to record when detecting motion? This can be set for each camera in the system.
  • What is the best FPS to record in for my situation? 7.5FPS, 15FPS, or 30FPS?
  • How long do you want to keep recorded video before recording over the oldest video? The answer will determine the size of the hard drive needed.
  • Is it important to view your system remotely? Live or Recorded?
Should you get a Hardware-based DVR or a PC-based DVR?
  • Hardware-based DVRs
    • Do not require computer skills and offer a wide range of recording capabilities. 
    • Come with an embedded Linux OS for trouble-free service.
    • Can record up to 16 camera channels at once and to one or more hard drives.
    • Can capture both audio and video at recording rates of 60 to 480 frames per second (FPS). 
  • PC-based DVRs
    • Offer the best flexibility for managing multiple sites.
    • Easy to upgrade. All our PC DVRs are expandable up to 32 cameras. This includes Pan/Tilt/Zoom (PTZ) security cameras.
    • They all come with our EZWatch Evolution software. The software supports a variety of recording modes, alarms, and schedules.
    • Motion detection recording allows you to adjust sensitivity levels for each security camera. You can block out areas you want the software to ignore.
If these questions seem daunting, a do it yourself project might not be the best route. If you want help choosing the correct system for your property, home, office, retail store, or warehouse talk to one of our expect security designers.

About Security Cameras

How can I be sure I have everything I need for a complete system?

Surprise, surprise—despite the first two letters in our name, shopping online for a security camera system is not always easy. You know it’s time to make a change but feel a little overwhelmed. Do you have that ache in your gut from having recently been violated by a vandal or intruder? Maybe you worry about how much you can spend in relation to how much protection you need. Worried you might get oversold or under-protected. There are so many factors that must play together perfectly. You need system for your home or business that works (up-and-running). You also need a system that works for you (happy customer), and does so inside of your budget.
Take a deep breath. All of this is normal. We want to help you process the information you need before you buy any equipment. Every complete system out there should include the following:
Everything you need for a complete video security system
  • The number of cameras needed for the application.
  • The correct length of Siamese cable to connect each camera to the DVR.
  • A power supply designed to provide power to all of the security cameras in your system.
  • A DVR with enough channels to record video footage from all connected security cameras
  • Enough hard drive storage to store your recorded video from all cameras.
  • Optional - If you wish to view the video at a dedicated location, you might add a video monitor to the system.

Can I install this system myself?

Mounting Surveillance Cameras Yes, most security systems are designed to be easy to install. We cover some of the most asked self-installation questions below:
What tools will I need? How do I mount it to metal, wood, concrete, or a drop tile ceiling?
  • If you are mounting to metal, wood, or a drop tile ceiling, a cordless drill is all you need (this assumes your system comes with pre-made siamese cables). Take extra caution when mounting cameras to a drop tile ceiling. Drop tiles can only support a small amount of additional weight. If you are mounting to concrete, you need a cordless drill with a heavy duty drill bit. The hole must be big enough to fit the siamese cable through. Be vary careful when drilling through resilient materials like concrete or wooden studs. Make sure to drill the hole only as big as needed.
How are the cameras mounted?
  • Wondering how to best mount security cameras? Most of ours are made for wall or ceiling mounting. They come with brackets that are adjustable for either scenario. Consult the included installation instructions on the preferred mounting applications for your security cameras.
How hard is it to wire the security system myself?
  • Running the cable from the cameras back to the DVR is the most time-consuming step. You will only have to run one cable from the back of every security camera to your DVR (assuming you are using high quality siamese cable). This does not account for motion sensors or microphones. These will add to your wiring job. Often, you will have to run wires through ceilings, walls, or rafters. Everything else is designed to be plug and play.
How do I align the security cameras once they are installed?
  • This step can be frustrating without a second person to assist. You will likely need a second person to assist in aligning each camera. One person will need to be near your DVR/Video Monitor. They provide feedback to the other person to help get the cameras aligned properly. If youa re working alone, a portable LCD camera service monitor can keep you from running back and forth from the camera to your video monitor to get the picture just right.
If you have other questions during installation, call the retailer your purchased from.

Once installed, where can I watch my cameras live from?

So you have your security system up and running. You now have two distinct options on how to view your live footage.
On-Site: You can connect a video monitor to your DVRs video output. Then you can view your cameras from a given location inside your home or business. This gives you a centralized location to review your footage. Bigger businesses often prefer this setup. It allows a private space for a security administrator to watch video streams 24/7.
Remote Viewing: EZWatch Evolution Remote Viewing Software Most CCTV security systems nowadays offer options for remote viewing.
Connect your DVR to your local internet connection. It can then broadcast the live and recorded footage to a wide variety of devices such as:
  • Desktop PC's
  • Macs / MacBooks
  • Laptops
  • Android Phones
  • Android Tablets
  • iPhones
  • iPads
  • Smartphones
  • And more!
People often use remote viewing to watch a facility before entering. Then they can be sure they are not walking into a dangerous situation. Others sometimes use the remote viewing to watch an employee they have concerns about. Regardless of how you use it, remote viewing is definitely essential in buying a security system today.

How long can I keep recorded video?

How long you can keep recorded video depends on available hard drive storage space. Keeping full 24-hour footage on a multiple camera system will require a BIG hard drive.


A few examples:
  • (1) 480p Security Camera recording video for 7 days, 24 hours/day, will require about 146GB under the following conditions:
    • 30 FPS Framerate
    • H.264 Encoding
    • No Audio
  • (4) 480p Security Cameras recording video for 7 days, 24 hours/day, will require about 582GB under the following conditions:
    • 30 FPS Framerate
    • H.264 Encoding
    • No Audio
  • (12) 480p Security Cameras recording video for 7 days, 24 hours/day, will require about 1746GB or 1.70TB under the following conditions:
    • 30 FPS Framerate
    • H.264 Encoding
    • No Audio
The examples above use the maximum possible FPS rate and 24/7 recording. If you need to record less than 24/7 or can accept a lower FPS rate you could use a smaller drive. A 1TB or 2TB hard drive is absolutely required for good quality video on almost any installation.
You can always pull recorded footage off onto a flash drive or portable hard drive. This is helpful if there is a specific incident you need to keep permanently.

Miscellaneous

I want to be able to...

Record in High Definition.
  • If you want to record in high definition, you'll need to install an HD-SDI system. HD-SDI stands for "High-Definition Serial Digital Interface". It allows you to run 1080p video through a standard coaxial cable. The wiring isn't any more complex or expensive than regular cable. HD-SDI provides a huge jump in picture quality. It is equal to HD programming you view on your HDTV at home. This eliminates the frustration of old security systems. Their quality generally fails to identify small details like characters on a license plate. The 1080p resolution that HD-SDI provides is top rated and can help an investigation. The security cameras and DVR must be HD-SDI compliant to record full 1080p footage. HD-SDI DVRs are a great upgrade for pre-existing security camera systems as well. You can replace your standard DVR with a hybrid HD-SDI DVR. You will only need to replace old analog cameras in the locations that are most important. You can simply reconnect the cameras you're not replacing. You can do this in just a few hours.

Analog Video vs 1080p HD-SDI Digital Comparison

Comparison of 420 Line Resolution Analog Video, 700 Line Analog Video, and 1080P HD SDI Digital Video from Security Camera Recordings

Hide these cameras from normal view.
Ways to Hide Security Cameras
  • There are hundreds of security cameras that appear to be something else. Hidden security cameras can look like clocks, smoke detectors, motion sensors and other items. The downside of these "nanny cam" type cameras is that they don’t generally record good video quality. Often they fail to produce a clear enough picture of an intruder.
  • There are many ways you can hide your regular security cameras. You can at least make them less obvious to intruders:
    • Hidden in a floor plant or flower pot.
    • Hidden within a child's toy.
    • Disguised within a bookcase.
    • Placed in a bird feeder.
    • Within a faux smoke detector.
    • Within a box of tissues.
    • Behind a wall clock.
    • Within your Entertainment Center.
    • And hundreds more!
Control the camera myself.
  • Do you want to be able to control the direction and zoom of your camera? You will need a PTZ (Pan Tilt Zoom) Camera. You will also need a PTZ controller. PTZ controllers require wiring separate from the camera power and video cable. For this reason, installing a PTZ camera is a bit more complex than a basic camera install. This PTZ controller is what grants you full control over the camera once installed. 
Hear audio and/or have microphones on my cameras.
  • If you want to hear and record audio, each security camera will need a microphone. The mic can be built in to the camera or external. You must know how many cameras need you need recording audio BEFORE shopping. It is important to plan for this at the beginning. Running an extra wire for audio after you have already wired your system can be a big pain. Run this audio wire along with the Siamese video power cable from each camera to your DVR. You can use zip ties where necessary to keep things nice and neat. Having a clean install makes it a lot easier if you ever upgrade your system in the future.
Night Vision Security Camera Record during the night.
  • If you need to record video at night, there are night vision cameras available. First, determine the size of the area you need to view. Then consider what resolution of the footage you need. Some night vision cameras come with built-in infrared lights. If you need crystal clear night vision of large spaces, these may not be enough. You can add a dedicated IR Illuminator. They can make your picture crystal clear even in pitch black conditions. These infrared illuminators work with any IR sensitive PTZ camera, Long Range Camera, or License Plate Camera.

original source: http://www.ezwatch.com/ultimate-buyers-guide-for-business-security-camera-systems#.VpUPlVmDBG0


About our Leader

CEO- Dennis Mancino graduated with a Bachelor’s degree in Business in New York. After graduation he received hands on experience in customer service and learning the basics of business ethics, and practices through various ventures. In 2013, recognizing the need for a better IT and video surveillance program and company, Mr. Mancino started HD View 360, an IT & Video Surveillance Company focusing on large commercial buildings in South Florida and Franchises nationwide, like European Wax Centers. He has recognized through his own experiences and knowledge that there is a need for a fundamentally strong IT and video surveillance company not only in south Florida but also nationwide.

Monday, January 11, 2016

Do security cameras really help keep your home or business secure? Dennis Mancino HD view 360



Security cameras have become an extra set of eyes for homeowners and businesses to help fight crime, but are they really that effective?

These days, you can find all types of cameras installed in and outside people’s homes, and the images are clearer than ever.

KHON2 wanted to know if they’re actually helping police officers solve crimes.

HPD says cameras have become an important tool for officers, but like all tools, owners must use them properly and with some discretion.

Chantal Keliihoomalu and her family woke up Tuesday morning and found out two of their cars, parked right outside their Kapolei home, had been broken into.

“We noticed that the contents of the middle compartment and the glove box in our car was emptied out and my husband’s wallet, which had been in the middle compartment, wasn’t there,” she said.
Her neighbor’s cars were also broken into and a security camera caught the suspect rummaging through the vehicles.

SECURITY CAMERA BREAK-IN

HPD says using security camera footage has become a critical part of an investigation.

“People are sending in a lot more than just, ‘Oh, I saw this guy or I saw this girl,’ and giving us a description,” said Sgt. Kim Buffett of Crimestoppers. “They’re like, ‘This is the picture. This is what they’re doing. This is where I saw it.’ So it really has been helpful to us solving crimes, definitely.”

Social media has also become part of the arsenal to fight crime. The Facebook page “Stolen Stuff Hawaii” allows group members to post videos of crimes in their neighborhood.

In the year and a half since it started, it has grown to 38,000 members and it keeps growing.

“We do see success stories quite frequently,” said Stolen Stuff Hawaii creator Michael Kitchens. “We see people that have posted, ‘Hey, we found the guys. Thanks for spreading the word. Somebody reported him. They saw him. We found our car.’ It is pretty successful in that regard.”

HPD says there’s no doubt that security cameras have played an important role in solving all types of cases, but like a lot of things, it does have its drawbacks.

The biggest one is privacy. Those cameras are only allowed to shoot in areas that are considered public space.

“If you’re going to video someone, make sure it’s in a public place and nobody has a reasonable expectation of privacy, because then you’ll be violating their privacy,” said Buffet.

Another common problem HPD faces is owners not being able to download the video when officers arrive.

Buffet asks that you should at least have the manual on hand so officers can figure out how to download the video.


About us:

HD View 360 currently offers a superior line of high-quality HD Security related products including Cameras, Recorders, IT equipment and more. The Company has researched the most popular cameras and supplies and provides those to its end users by way of manufacturing these products and by direct sales and service. HD View 360 communicates with consumers and retailers about its products in a variety of ways. Information about HD View 360—the company as well as its products—is available via the Internet, direct mailings, and in person. The firms’ promotional efforts and charity support also seek to differentiate its products from those of its competitors.

The company maintains a personal contact with clients and referrals, to establish a relationship about the products and services with their customers. This contact, whether in-person or by phone, helps convey the HD View 360 message, demonstrate the products’ unique qualities, and builds solid relationships.

For more information or to schedule an appointment please visit www.hdview360.com


source: http://khon2.com/2016/01/06/do-security-cameras-really-help-keep-your-home-or-business-secure/




Friday, January 8, 2016

HD VIEW 360 Announces S1 Registration for Public Markets- Dennis MAncino HD view 360





As CEO of HD view 360 I am please to announce the filing of an S1 registration to take HD view 360 public. We have worked extremely hard over the last 6 months to take the measured steps needed to make this a reality. Our business has grown by leaps and bounds and in order for us to grow at the pace we need it was a logical step to move towards the public markets to gain traction in market share and tap the liquidity needed to acheive our goals as a growing company.


About HD view 360

Our Operations

We provide full service IT Networking and Installation services to commercial clients in the U.S. Most of our revenues derive from the installation of security and surveillance systems which are generally non-recurring. Our customers are primarily commercial entities. We sell surveillance products and install security systems primarily for commercial customers and generate revenues from the sale of these systems to our customers and, to a lesser extent, from maintenance of these systems for our customers. After we have installed a system at any particular customer site, we have generated the majority of revenues from that particular client. We would not expect to generate significant revenues from any existing client in future years unless that client has additional installation sites for which our services might be required. Therefore, in order to maintain a level of revenues each year that is at or in excess of the level of revenues we generated in prior years, we must identify and be retained by new clients. If our business development, marketing and sales techniques do not result in an equal or greater number of projects of at least comparable size and value for us in a given year compared to the prior year, then we may be unable to increase our revenues and earnings or even sustain current levels in the future.

Our Surveillance Systems and Products

Our products capture, digitize and transmit video over different types of wired and wireless networks using analog, internet protocol and serial digital interface technology. Our products allow users to deploy an end-to-end IP video solution with analytics or evolve to IP video operations without discarding their previous investments in analog closed circuit television technology.

Our products are marketed under the HD View 360 brand.

We believe that the following competitive strengths will enable us to sustain our leadership in the video intelligence market:

·Our open platform facilitates interoperability with our customers’ existing business and security systems and with complementary third-party products.

·We are able to help our customers cost-effectively migrate to networked IP video without the need to discard their analog CCTV investments.

Our basic security system starts at $995 which includes installation.  Our products are sold from our retail location at 333 NE 24th Street, Suite 100B, Miami, Florida 33137. Orders originating from our website are placed by telephone.




to view the entire S1 filing please visit : http://www.sec.gov/Archives/edgar/data/1651716/000152013815000645/hdrw-s1.htm

Thursday, January 7, 2016

The Biggest Security Threats We’ll Face in 2016 Dennis Mancino HD View 360




Hackers are nothing if not persistent. Where others see obstacles and quit, hackers brute-force their way through barriers or find ways to game or bypass them. And they’ll patiently invest weeks and months devising new methods to do so.
There’s no Moore’s Law for hacking innovation, but anyone who follows cybersecurity knows that techniques get bolder and more sophisticated each year. The last twelve months saw several new trends and next year no doubt will bring more.
Here’s our take on what to expect in 2016.

Extortion Hacks

Following the Sony hack in late 2014, we predicted that hacker shakedowns would increase in 2015. By shakedown, we were referring not to standard ransomware attacks, whereby malware encrypts or otherwise locks access to a victim’s computer until the victim pays a ransom. We meant extortion hacks where attackers threaten to release sensitive company or customer data if the victim doesn’t pay up or meet some other demand. With these attacks, even if you have backed up your data and don’t care that hackers have locked you out of your system, public release of the data could ruin you and your customers.
There’s just one problem with tracking such attacks. If the victim caves and does pay, the public may not know extortion occurred. We do, however, have at least two extortion hacks on record for 2015: the Ashley Madison hack, which took down a CEO and exposed possibly millions of would-be cheaters to public ridicule and worse; and the hack of InvestBank in the United Arab Emirates, which resulted in the exposure of customer account information. Extortion hacks play to the deepest fears of companies and executives—if not handled well, company secrets are exposed, customers file lawsuits, and executives lose their jobs. Expect such attacks to become more prevalent in 2016.

Attacks That Change or Manipulate Data

In testimony this year, James Clapper, the director of national intelligence, told Congress that cyber operations that change or manipulate digital data in order to compromise its integrity—instead of deleting or releasing stolen data—is our next nightmare. Mike Rogers, head of the NSA and US Cyber Command said the same thing. “At the moment, most [of the serious hacks] has been theft,” Rogers said. “But what if someone gets in the system and starts manipulating and changing data, to the point where now as an operator, you no longer believe what you’re seeing in your system?”
Data sabotage can be much more difficult to detect than the kind of physical destruction caused by Stuxnet. That’s because data alterations can be so slight yet have enormous consequences and implications. Anyone remember the Lotus 1-2-3 bug back in the 90s that would produce accounting miscalculations in spreadsheets under certain conditions? That was an unintentional error. But attackers could get into financial and stock-trading systems to alter data and force stock prices to rise or fall, depending on their aim.
Certain types of data manipulation could even result in deaths. In 1991 a Patriot missile in Saudi Arabia during the first Gulf War failed to intercept an incoming Scud missile due to a software glitch in the weapon’s control computer, allowing the Scud to hit an Army barracks and kill 28 soldiers. Again, this was an unintentional bug. But Chinese spies have invaded numerous US defense contractor networks in the last decade, raising concern among US military officials that they’re not just stealing blueprints to copy weapons, but might also alter or insert code to sabotage the integrity of weapons systems and change how they operate.

Chip-and-PIN Innovations

Any time the security community closes one avenue of attack, hackers adapt and find another. When retailers stopped storing customer credit card numbers and transactions in databases, hackers sniffed their networks to grab the unencrypted data live as it was sent to banks for authentication. When retailers encrypted that live data in transit to prevent sniffing, attackers installed malware on point-of-sale readers to grab data as the card got swiped and before the system encrypted the numbers. Now banks and retailers have begun rolling out new chip-and-PIN cards to thwart hackers once again.
The cards contain a chip that authenticates it as a legitimate bank card and also generates a one-time transaction code with each purchase, preventing hackers from embossing stolen data onto fake cloned cards to use for fraudulent purchases in stores. But this won’t stop fraud altogether; it will simply shift from brick-and-mortar stores to online retailers. In the UK, where chip-and-PIN cards have been used since 2003, card-present fraud—transactions done in person—has dropped. But fraud for card-not-present transactions—those completed over the phone or online—increased from 30 percent to 69 percent of total card fraud between 2004 and 2014, according to the UK Payments Administration. Neither a PIN nor a signature is required when customers use their cards online, so simply stealing card numbers is sufficient for this kind of fraud. Expect those online fraud numbers to rise in the US as well.

The Rise of the IoT Zombie Botnet

There are many who say that 2015 was the year of the Internet of Things; but it was also the year the Internet of Things got hacked. Connected cars, medical devices, skateboards, and Barbie dolls, were just a few items shown to be vulnerable to hackers this year.
If 2015 was the year of proof-of-concept attacks against IoT devices, 2016 will be the year we see many of these concept attacks move to reality. One trend we’ve already spotted is the commandeering of IoT devices for botnets. Instead of hackers hijacking your laptop for their zombie army, they will commandeer large networks of IoT devices—like CCTV surveillance cameras, smart TVs, and home automation systems. We’ve already seen CCTV cameras turned into botnet armies to launch DDoS attacks against banks and other targets. Unlike a desktop computer or laptop, it can be harder to know when your connected toaster has been enlisted in a bot army.

More Backdoors

The year ended with a startling revelation from Juniper Networks that firmware on some of its firewalls contained two backdoors installed by sophisticated hackers. The nature of one of the backdoors—which gives an attacker the ability to decrypt protected traffic running through the VPN on Juniper firewalls—suggested a nation-state attacker was the culprit, since only a government intelligence agency would have the resources to intercept large amounts of VPN traffic in order to benefit from the backdoor. Even more startling was news that the backdoor was based on one attributed to the NSA.
There’s no evidence yet that the Juniper backdoor was installed by the NSA; it’s more likely that an NSA spying partner—possibly the UK or Israel—or a US adversary installed it. But now that companies and researchers know for certain what such a backdoor would look like in their system and how it would operate, expect more backdoors to be uncovered in 2016 as companies closely scrutinize their systems and products. And despite the fact that the Juniper incident shows that backdoors intended for US law enforcement and intelligence agencies can be subverted by others for their own malicious use, don’t expect the FBI and NSA to give up on their quest for encryption backdoors in 2016.

About HD View 360

HD View 360 currently offers a superior line of high-quality HD Security related products including Cameras, Recorders, IT equipment and more. The Company has researched the most popular cameras and supplies and provides those to its end users by way of manufacturing these products and by direct sales and service. HD View 360 communicates with consumers and retailers about its products in a variety of ways. Information about HD View 360—the company as well as its products—is available via the Internet, direct mailings, and in person. The firms’ promotional efforts and charity support also seek to differentiate its products from those of its competitors.

The company maintains a personal contact with clients and referrals, to establish a relationship about the products and services with their customers. This contact, whether in-person or by phone, helps convey the HD View 360 message, demonstrate the products’ unique qualities, and builds solid relationships.

For more information visit our website www.hdview360.comwww.hdview360.com



source: http://www.wired.com/2016/01/the-biggest-security-threats-well-face-in-2016/

Tuesday, January 5, 2016

In 2016, terror suspects and 7-Eleven thieves may bring surveillance to Supreme Court - Presented by Dennis Mancino HD view 360





It has now been 2.5 years since the first Snowden revelations were published. And in 2015, government surveillance marched on in both large (the National Security Agency) and small (the debut of open source license plate reader software) ways.
Within the past year, Congress voted to end Section 215 of the Patriot Act—but then substituted it with a similar law (USA Freedom Act) that leaves the phone metadata surveillance apparatus largely in place even if the government no longer collects the data directly. Even former NSA Director Michael Hayden admitted in June 2015 that this legal change was pretty minor.
We also saw some notable 2015 reforms as to how federal law enforcement uses stingrays, the invasive cell-phone surveillance devices in use by everyone from local cops all the way up to the FBI, the Department of Homeland Security (DHS), and the Internal Revenue Service (IRS). The Department of Justice (the parent agency of the FBI) and DHS both announced new policies that require the agencies to get a warrant prior to deploying the snooping device.
And in October 2015, America’s most populous state implemented the California Electronic Communications Privacy Act. Among other reforms, this act imposed a warrant requirement for the state’s cops when using a cell-site simulator. Other states that already have similar laws include Washington, Virginia, Minnesota, and Utah. But perhaps 2015's most notable surveillance happenings took place in the court room. Last year, we summarized five cases and trumpeted: “If the Supreme Court tackles the NSA in 2015, it’ll be one of these five cases.” Exactly zero of the cases we profiled got anywhere close to the nine justices. In short, the rise of surveillance tech and the glacial pace of surveillance legislation proves the old adage: technology moves at a lightning pace, but the wheels of justice can turn frustratingly slowly.
Luckily, 2016 may contain a number of equally, if not more important, cases that are currently sitting at the appellate level, meaning these decisions may even file to be heard by the Supreme Court. Our list of five cases to watch in 2016 includes a handful of criminal suspects who were told about government surveillance used against them after their convictions. Beyond that shared detail, the cases can wildly vary. One man was convicted of plotting to blow up a 2010 Christmas tree lighting ceremony in Portland, Oregon; another case centers around dozens of fast-food robberies.

Happy Holidays

Case name: United States v. Mohamud
Status: Appeal pending in 9th Circuit Court of Appeals
Let's start with the Christmas tree. United States v. Mohamud involves a Somali-American who is accused of trying to blow up a 2010 lighting ceremony in Portland. Undercover FBI agents posed as jihadis and presented Mohamud with the means to conduct the operation, which turned out to be wholly bogus. Mohamed Osman Mohamud was eventually found guilty and sentenced to 30 years in prison.
But after the conviction, the government disclosed that it used warrantless surveillance under Section 702 of the FISA Amendments Act. Seeing this, Mohamud’s legal team attempted to re-open the case—but the judge denied their motion. Mohamud's defense lawyers continue to raise this issue on appeal.
As Stephen Sady, Mohamud’s attorney, wrote in the May 2015 appellate brief to the 9th Circuit:
For the contents of Americans’ communications, any balancing of interests has already been performed by the Constitution: a particularized warrant, based on probable cause, is necessary for the government to collect and read the content of, or listen to, Americans’ private conversations. The § 702 programs are unprecedented in terms of the broad scope of the collections and the lack of any particularized suspicion to support the massive acquisition and retention of Americans’ communications.
Federal prosecutors countered by saying that there is no misuse of Section 702 in this case. As they argued:
Section 702 provides that targeting procedures must be “reasonably designed” to “ensure that any acquisition authorized under [the certification] is limited to targeting persons reasonably believed to be located outside the United States” and to “prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States.” See 50 U.S.C. § 1881a(d)(1). The FISC has repeatedly held that collection pursuant to the Section 702 targeting procedures meets these requirements and is reasonable under the Fourth Amendment.
The case represents the thorny nexus between law enforcement standards and national security, where different rules of evidence and disclosure apply. Although Mohamud is accused of terrorism, he is being tried in open civilian court as a criminal.
Sady has until February 29, 2016 to file his reply—oral arguments will likely follow sometime later in the year.

Ineffective counsel doesn't even describe it

Case name: United States v. Hasbajrami
Status: Appeal pending in 2nd Circuit Court of Appeals
Similar to Mohamud, this case involves a United States person (citizen or legal resident) accused of attempting to provide support for terrorism-related activities. According to the government, Agron Hasbajrami, an Albanian citizen and Brooklyn resident, traded e-mails with a Pakistan-based terror suspect back in 2011. The terror suspect claimed to be involved in attacks against the US military in Afghanistan. After he was apprehended, Hasbajrami pleaded guilty to attempting to provide material support to terrorists in 2013. Federal prosecutors laid out the details in a press release following his sentencing hearing:
Hasbajrami sent the individual more than $1,000 to support the jihadist cause. Then, in pursuit of his goal to engage personally in violent jihad, Hasbajrami arranged to meet the individual in the Federally Administered Tribal Area of Pakistan (the “FATA”). In one e-mail message, Hasbajrami stated that he wished to travel abroad to “marry with the girls in paradise,” using jihadist rhetoric to describe his desire to die as a martyr.
After he pleaded guilty, the government informed Hasbajrami that it had used Section 702 surveillance against him. Thus, the case was re-opened. That fact is notable, as many cases that have tried to fight surveillance have fallen down for lack of standing. Hasbajrami's case is different, however, because he can definitively prove that he was spied upon by the government.
As the case was nearing trial by mid-2015, Hasbajrami pleaded guilty a second time. But shortly thereafter, he moved to withdraw the plea again. In a handwritten letter to the judge dated July 20, 2015, he wrote:
The judge denied his request. The Albanian was sentenced to 16 years in prison and ordered to be deported back to Albania upon the conclusion of his incarceration. Hasbajrami's lawyers have filed notice of their appeal in the 2nd Circuit but have yet to file their opening brief. It will likely come sometime in 2016.

No leg to stand on

Case name: Wikimedia v. NSA
Status: Appeal pending in 4th Circuit Court of Appeals
Similar to other anti-surveillance cases, Wikimedia v. NSA targets the agency's “upstream” setup where the NSA grabs data directly off of fiber optic cables. In its civil complaint filed in March 2015, Wikimedia and the various other groups suing the NSA allege that the government is engaged in illegal and unconstitutional searches and seizures of these groups' communications. In October 2015, US District Judge T.S. Ellis III dismissed the case, finding that Wikimedia and the other plaintiffs had no standing and could not prove that they had been surveilled. That action largely echoed a previous Supreme Court decision, the 2013 case of Clapper v. Amnesty International. This time, Judge Ellis found that there is no way to definitively know if Wikimedia, which publishes Wikipedia, is being watched. As he wrote in his memorandum opinion:
Plaintiffs' argument is unpersuasive, as the statistical analysis on which the argument rests is incomplete and riddled with assumptions. For one thing, plaintiffs insist that Wikipedia's over one trillion annual Internet communications is significant in volume. But plaintiffs provide no context for assessing the significance of this figure. One trillion is plainly a large number, but size is always relative. For example, one trillion dollars are of enormous value, whereas one trillion grains of sand are but a small patch of beach.

As already discussed, although plaintiffs have alleged facts that plausibly establish that the NSA uses Upstream surveillance at some number of chokepoints, they have not alleged facts that plausibly establish that the NSA is using Upstream surveillance to copy all or substantially all communications passing through those chokepoints. In this regard, plaintiffs can only speculate, which Clapper forecloses as a basis for standing.
Since the June 2013 Snowden revelations, it has been difficult for legal challenges filed against government surveillance to advance in the courts. But Wikimedia and its co-plaintiffs are still appealing—briefs are due within the coming months.

No more third-party doctrine?

Case name: United States v. Graham
Status: En banc appeal pending in 4th Circuit Court of Appeals
While all the previous cases that we’ve addressed have to do with large, federally driven government surveillance, more garden-variety snooping persists: like getting cell-site location information (CSLI) without a warrant.
This case dates back to February 5, 2011 when two men robbed a Burger King and a McDonald’s in Baltimore—10 minutes later, they were caught and cuffed by Baltimore City Police officers. Eventually, Aaron Graham and Eric Jordan were charged with 17 federal counts of interstate robbery, including a pair of fast food robberies and another one at a 7-Eleven. They also received charges for brandishing a firearm in furtherance of the crime.
A Baltimore City Police Detective first sought and obtained a search warrant for the two cell phones recovered during a search of the getaway car. Prosecutors later obtained a court order (a lesser standard than a warrant) granting disclosure of the defendants’ CSLI data for various periods totaling 14 days when the suspects were believed to have been involved in robberies. The government next applied for (and received) a second application to another magistrate judge for a new set of CSLI data, covering a period of July 1, 2010 through February 6, 2011 (221 days).
In court, the defendants argued in a motion to suppress this evidence that “the privacy intrusions available through this type of technology are far-reaching and unconstitutional—allowing the government to retroactively track or survey a suspect through his cellular telephone, a device he likely carries with him at all hours of the day and to constitutionally protected places such as his home or church.” A district judge agreed with the government’s argument under the classic “third-party doctrine,” finding that because the men voluntarily disclosed their own location to their mobile carrier via their phones, they did not have a reasonable expectation of privacy. The defendants’ motion to challenge this evidence was denied.
In August 2012, Graham and Jordan were found guilty on nearly all counts. They were sentenced to 147 years in prison and 72 years, respectively. By June 2013, appellate lawyers Meghan Suzanne Skelton and Ruth Vernet appealed to the 4th Circuit Court of Appeals. The duo argued:
Here, the government exploited new technology to access private information that was otherwise unavailable without a warrant. It obtained location information for more than 36,000 calls and text messages, retroactively learning where the defendants were over 221 nights and days, and did so without a warrant, without demonstrating probable cause, and without establishing the presence of any exception to the Fourth Amendment’s warrant requirements. (JA 253.) The government intruded upon the defendants’ subjective and objectively reasonable expectations of privacy when it tracked the defendants using 221 days worth of CSLI. Accordingly, this was an unconstitutional warrantless search.
In August 2015, the appellate court found Skelton and Vernet’s arguments persuasive, crucially tossing aside the oft-relied-upon third-party doctrine. As the appellate judges wrote:
These precedents do not categorically exclude third-party records from Fourth Amendment protection. They simply hold that a person can claim no legitimate expectation of privacy in information she voluntarily conveys to a third party. It is that voluntary conveyance—not the mere fact that the information winds up in the third party’s records—that demonstrates an assumption of risk of disclosure and therefore the lack of any privacy.

We decline to apply the third-party doctrine in the present case because a cell phone user does not “convey” CSLI to her service provider at all—voluntarily or otherwise—and therefore does not assume any risk of disclosure to law enforcement.
The government asked the court to rehear the case en banc (where all 15 judges, rather than a standard three-person panel, hear it). Oral arguments are scheduled for March 2016.
If the existing 4th Circuit decision is upheld, Graham would likely be a strong candidate for the Supreme Court. In such a situation, that upheld decision would create a split with the 11th Circuit in a related case, US v. Davis.
Speaking of notable cases to watch in 2016...
Aurich Lawson

Don't forget about Dread Pirate Roberts

As an honorable mention for cases that we’re following in 2016, we’ll also include the forthcoming appeal of Ross Ulbricht.
While Ulbricht was not subjected to any phone metadata surveillance under Section 215 of the Patriot Act or Section 702 of the FISA Amendments Act, he was certainly surveilled by various federal agencies including the FBI, the Department of Homeland Security, and the Internal Revenue Service. The young Texan was convicted as being Dread Pirate Roberts, the creator of the online drug market Silk Road in February 2015. Ulbricht was sentenced in May 2015 to life in prison, despite emotional pleas from his family and friends for a lesser sentence. At his sentencing hearing, Ulbricht even pleaded himself for leniency. "I wish I could go back and convince myself to take a different path... If given the chance, I would never break the law again."
US District Judge Katherine Forrest had none of it. "Silk Road's creation showed that you thought you were better than the law," she said.
Coincidentally, Ulbricht's lawyer, Joshua Dratel, also represents Hasbajrami.
Ulbricht’s appeal, in the 2nd Circuit Court of Appeals, is due January 12, 2016.



source: http://arstechnica.com/tech-policy/2016/01/in-2016-terror-suspects-and-7-eleven-thieves-may-bring-surveillance-to-supreme-court/